Commit Graph

1095 Commits

Author SHA1 Message Date
448d840e4c [*] missing free in bd94b73d 2023-04-30 09:02:13 +01:00
bd94b73dde [+] New TLSView implementation
[+] AuTLSVariable
2023-04-30 08:24:27 +01:00
37472e508e [+] AuMemory::SharedByteBuffer
[+] AuMemory::ByteBuffer.flagNoFree
[*] SetBuffer(MemoryViewRead readView, bool bMoveWriteHeadForReaders = true);
...added bMoveWriteHeadForReaders
[-] AuMemory::SetBuffer(const void *in, AuUInt length)
[-] AuMemory::SetBuffer(const AuList<AuUInt8> &buffer)
[*] Harden AuMemory::ByteBuffer::RemainingBytes bc it is a high level api that is not called excessively. Invalid head states should not mess with ::CanRead/::CanWrite
[*] Harden AuMemory::ByteBuffer::RemainingWrite bc it is a high level api that is not called excessively. Invalid head states should not mess with ::CanRead/::CanWrite
2023-04-30 02:39:42 +01:00
e0d672ae9b [+] ByteBuffer::SetBuffer(MemoryViewRead readView)
[*] revert 6317a563
2023-04-29 14:04:31 +01:00
c3a986495c [*] AuByteBuffers should be able to .Write<std::string_view>() 2023-04-29 07:50:56 +01:00
6317a5631d [*] update ResetPositions 2023-04-29 07:46:35 +01:00
e4e3e70be2 [*] sanitize these AuByteBuffer utilities to prevent exploitation 2023-04-29 07:38:16 +01:00
cc317882e9 [*] clamp head positions during non-circular realloc 2023-04-29 07:34:00 +01:00
6683d3cfdc [+] IProtocolPiece.GetNextPiece
[+] IProtocolPiece.ReallocateDrainBuffer
[*] Harden protocol piece use after destroy
2023-04-29 07:00:29 +01:00
c787d85485 [*] bug: fix process time counters under win32 2023-04-29 05:26:53 +01:00
0175809d0a [*] Compression pipe now returns false should an error occur 2023-04-29 03:10:08 +01:00
4086fc94bb [*] bug fix: RNG strings werent deterministic 2023-04-28 04:59:09 +01:00
d791725438 [*] remove extra whiteline introduced in da69428d 2023-04-28 02:44:39 +01:00
da69428d7e [+] IProtocolStack::PrependInterceptorEx
[+] IProtocolStack::PrependSingleFrameProcessor
[+] IProtocolStack::PrependSingleFrameProcessorEx
[+] IProtocolStack::GetArrayOfInterceptors
[+] IProtocolStack::GetInterceptorAtIndex
[+] IProtocolPiece::ToInputWriter
[+] IProtocolPiece::GetExtendedInterceptor
[+] IProtocolPiece::GetShortPipeInterceptor
2023-04-28 02:41:45 +01:00
f8219542c5 [*] precache socket network state errors here before the last transaction is released 2023-04-27 10:44:15 +01:00
eb4ee3143d [*] bug: missing link 2023-04-27 10:26:41 +01:00
f1e9a7262b [*] pipe processors with a stack attached to them should destroy the stack to forcefully break circular references in user code 2023-04-27 06:10:09 +01:00
f70d6392d9 [*] harden 2023-04-27 01:34:29 +01:00
efadd964be [*] Improved disconnect reason reporting: HasErrorCode under the NT network async stream object 2023-04-26 20:32:25 +01:00
4b79aa902b [*] i dont think this path should ever be hit, but just to be certain, lets check the networks output channel translation object for an error if the socketbase doesnt know of the last fatal error code 2023-04-26 20:22:11 +01:00
b8540c77a7 [*] improved network error reporting 2023-04-26 20:13:17 +01:00
044fb5b7e4 [*] added additional arg checks to ByteBuffers constructors 2023-04-26 07:43:56 +01:00
3f0368b99d [*] cache these adapter allocations away 2023-04-26 07:37:14 +01:00
30b0c2e0ba [*] Preemptive GetOverlappedResult fast-paths under WaitMultiple2 that rely on the alertable yield under next read/write cannot be trusted if the read count is zero.
Direct IO-specific quirk?
Windows 7 specific quirk?
Direct IO under Win7 specific quirk?
idk, but this fixes it
2023-04-26 07:25:45 +01:00
22c4d25759 [*] amend cdf5a499, bKillPipeOnFirstRootLevelFalse not respected 2023-04-25 12:57:15 +01:00
48fc0cdaed [*] amend SysPanic2 to support 0 args 2023-04-25 12:23:22 +01:00
cdf5a499cb [*] Improved pipe work awareness under protocol stack to allow for propagation of error conditions such that the top most interceptor can kill the pipe work 2023-04-25 12:13:16 +01:00
e0d7bbea01 [*] stream regression 2023-04-25 10:09:37 +01:00
664eb270dc [+] IIOPipeWork::GetBytesProcessedInterframe
[*] IOPipeProcessors will now cap reported progression to the requested length if the requested page size would mean we overrun it.
2023-04-25 07:38:36 +01:00
f52175d7ce [*] build error 2023-04-25 02:59:18 +01:00
36dee459ca [*] TryLockRead was unware of RWRenterableLocks specifications
(not an issue for regular blocking lock paths)
2023-04-24 19:39:36 +01:00
8dcf857da5 [*] updated comments 2023-04-23 19:39:54 +01:00
f74a41e286 [*] Refactor our thread primitives for an SOO change, where the SOO[_t]-suffix is no longer required, resulting a new type conflict issue 2023-04-23 19:25:37 +01:00
5fd655b501 [*] further deprecate 2023-04-22 23:08:49 +01:00
772d08fee6 [*] amend 2a33d61e 2023-04-22 23:04:46 +01:00
2a33d61e63 [*] further deprecate high res clock
[*] further posix resolution reporting
2023-04-22 22:58:20 +01:00
945d54ef78 [*] i did a dumb 2023-04-22 22:38:37 +01:00
62c29d0600 [*] clock switcheroo 2023-04-21 22:35:33 +01:00
4d84e8f7f3 [+] AURORA_ASSERTIONS_FORCE_EXPRESSIONS 2023-04-21 22:21:28 +01:00
4d9d6ae474 [+] SysUnreachable 2023-04-21 22:09:01 +01:00
6d73dde240 [+] Thread + Process clocks 2023-04-21 22:08:56 +01:00
92af491fe8 [*] if (count == 1) * 2023-04-21 18:52:30 +01:00
4b0dfabd67 [*] Comments 2023-04-21 05:58:24 +01:00
36c163d90c [*] 2af2eadf cont 2023-04-19 23:57:56 +01:00
d7d514c6b7 [*] protocol-stack ticks now check against the buffers error flags to ensure Writes/Reads weren't being silently dropped in user code 2023-04-19 23:46:56 +01:00
2af2eadfa8 [*] Resolve: protocol-stack link bug (multiple append failure / missing next link) 2023-04-19 23:35:48 +01:00
00129255f8 [*] changed this to be a soft-failure 2023-04-19 04:03:49 +01:00
11ba608727 [*] bonk 2023-04-19 03:54:55 +01:00
99123bb094 [*] why the hell were these made const 2023-04-19 03:17:45 +01:00
bfd4069994 [*] logger mitigations cont - current thread callback may as well be sanitized as well 2023-04-18 02:30:11 +01:00